General

  • Target

    457b849ab77aa59fca97484b22506966a90cc1657b1d6766a70789a3f9fe0c48

  • Size

    937KB

  • Sample

    231012-ecnb5sdc6t

  • MD5

    3425ee6512fd3261419c1884e7927c44

  • SHA1

    302403783d00df8d96355c108757051b040dd973

  • SHA256

    457b849ab77aa59fca97484b22506966a90cc1657b1d6766a70789a3f9fe0c48

  • SHA512

    e13e3cf116af5f084714b5283ae4a8a6cbb4ff5b59f7a8cd134dc5d50ce465779cee583c4d146469775517ff82488c3f4087c8ba73207be783b718bd82d64038

  • SSDEEP

    24576:Uyk7ho7n05eJj330Avw+xAgSwhvZwCTHOY:j0hen7Jfx4UvOCTu

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      457b849ab77aa59fca97484b22506966a90cc1657b1d6766a70789a3f9fe0c48

    • Size

      937KB

    • MD5

      3425ee6512fd3261419c1884e7927c44

    • SHA1

      302403783d00df8d96355c108757051b040dd973

    • SHA256

      457b849ab77aa59fca97484b22506966a90cc1657b1d6766a70789a3f9fe0c48

    • SHA512

      e13e3cf116af5f084714b5283ae4a8a6cbb4ff5b59f7a8cd134dc5d50ce465779cee583c4d146469775517ff82488c3f4087c8ba73207be783b718bd82d64038

    • SSDEEP

      24576:Uyk7ho7n05eJj330Avw+xAgSwhvZwCTHOY:j0hen7Jfx4UvOCTu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks